Our dependence on cyber-connectivity

November 2018 Editor's Choice, Cyber Security, Government and Parastatal (Industry)

What would your life (or even a day) be like without all the amenities we take for granted? Our nation’s cities and critical infrastructure are almost totally reliant on the Internet.

Craig Rosewarne
Craig Rosewarne

A doomsday scenario could begin with waking up to no electricity and water. You attempt to contact the office, but all telecoms are down. Thank heavens you can get to the office you surmise, but alas not. Petrol stations are closed, all banking systems are offline, highways are snarled with out of gas or hacked vehicles. Supermarkets are being invaded and looted as panic sets in. Emergency services collapse with medical facilities in particular being forced to turn away patients.

As the days and weeks pass, money begins to lose its value and people begin to return to trading in gold and other precious commodities. The black-market booms and simple items such as batteries, LP gas, solar panels, bottled water, etc. suddenly begin to be much sought-after items.

Impossible you may say. However, unless we all play our part to protect our infrastructure, the above is a very real scenario.

Just ask Ukrainians who received a small dose of state sponsored attacks from 2015 onwards. Virtually every sector of their nation’s critical infrastructure has been targeted, namely energy, media, military, finance and political system.

“If you close your eyes to facts, you will learn through accidents” – African proverb
“If you close your eyes to facts, you will learn through accidents” – African proverb

Safeguarding the nation’s critical infrastructure

The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems. A country may experience widespread disruption, or even experience loss of human life if these systems become inoperable.

The reliability, stability and protection of interconnecting information infrastructures have become key to the operation of a nation’s critical systems. National Critical Information Infrastructures (CII) include information infrastructures, which support essential components vital to a national economy.

They usually comprise of a number of different infrastructures, interconnections and critical information flows between them. Traditionally closed Operational Technology (OT) systems are now being given IP addresses. Terms such as Industry 4.0, artificial intelligence, autonomous vehicles and Internet of Things (IoT) are now opening up all sectors to cyberspace. This allows cyber threats to make their way out of traditional back-office systems and into critical infrastructures such as power generation, transportation and other automation systems. Like all developing countries, South Africa has an increasing number of interconnected electronic systems.

Not only a challenge for government

Due to mounting pressure from both external and internal threats, South African organisations responsible for critical infrastructure need to have a consistent and iterative risk-based approach towards identifying, assessing and managing cybersecurity risk. This needs to become a priority, regardless of the organisation’s size, threat exposure or cybersecurity sophistication. Table 1 highlights key critical infrastructure stakeholders across the public and private sectors in SA.

Table 1.
Table 1.

An approach for securing our critical infrastructure

Although South African organisations have made great strides in information security in general, additional measures are needed to protect our national CII.

1. Prevent

Utilise a Threat Intelligence approach to predict the most likely attacks, targets and methods. Prevent or deter attacks so that no loss is experienced. Develop organisational understanding in order to manage cybersecurity risk to systems, assets, data and capabilities. Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.

2. Detect

Develop a capable threat detection capability: trained staff, appropriate monitoring processes and implement technology to identify vulnerabilities or the occurrence of a cybersecurity event.

3. Respond

Utilise an effective incident management framework and establish a business-aligned incident response team. Develop incident procedures, ‘battle guides’ and run simulation exercises to allow a rapid response to incidents.

4. Recover

Develop and implement the appropriate activities to maintain plans for resilience. Restore any capabilities or services that were impaired by a cybersecurity event.

Valuable lessons learned

Critical Information Infrastructure Protection (CIIP) is the shared responsibility of both the public and private sector.

• The most effective way to secure a business is to use a combination of layered cyber and physical information in addition to human security measures.

• Measures should be proportionate to the expected threat and risk profile of your organisation, as well as the specific industry and location of operations.

• It is not possible to protect all assets at all times. Prioritise the key areas to protect first.

• Security is more cost effective when incorporated into longer-term planning.

For more information contact Wolfpack Information Risk, +27 11 794 7322, info@wolfpackrisk.com, www.wolfpackrisk.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Tips on secure remote working
Issue 3 2020 , IT infrastructure, Cyber Security
NordVPN advises how to stay secure while working from home during the coronavirus outbreak.

Read more...
Four financial risks for the future
Issue 3 2020, CA Southern Africa , Editor's Choice
Gregory Dellas, security presales consultant at CA Southern Africa, highlights four areas of cyber-risk the financial industry will face in 2020 onwards.

Read more...
Securex postponed to August 2020 due to COVID-19
Issue 3 2020 , Editor's Choice
Specialised Exhibitions has opted to reschedule its Securex South Africa, A-OSH Expo and Facilities Management Expo trade shows to 18 to 20 August 2020.

Read more...
Leaders in risk & security: Yesterday’s achievement, tomorrow’s standard
Issue 3 2020, Technews Publishing , Editor's Choice
Jack Edery ran a successful security distribution company and developed a team that was the envy of his competitors.

Read more...
The impact of the COVID-19 virus on security
Issue 3 2020, Leaderware , Editor's Choice
The social and personal implications of the COVID-19 Corona virus has already had a devastating impact on countries, social institutions, communities, businesses and individuals.

Read more...
85% of South African businesses are vulnerable to disruption
Issue 3 2020 , Editor's Choice
Disruption is an inescapable and growing threat across industries in South Africa. Accenture’s 2020 Innovation Maturity Index shows that the majority of South African companies are vulnerable.

Read more...
Round table: Secure identification and authentication
Issue 3 2020, Technews Publishing, Dahua Technology South Africa, Suprema, neaMetrics, ViRDI Distribution SA, ZKTeco , Editor's Choice
Hi-Tech Security Solutions hosted a round-table specifically to look at what is happening in the world of secure identity verification and authentication.

Read more...
Driving success in turbulent times
Issue 3 2020 , Editor's Choice
It’s time to strap on innovation and digital, and stride into the opportunities that lurk within a stagnant market.

Read more...
Tech Trailblazers Award winners announced
Issue 3 2020, Technews Publishing , Editor's Choice
The Tech Trailblazers Awards winners were announced recently, recognising outstanding early-stage companies across 10 major enterprise technology categories.

Read more...
IRMSA launches Risk Report for 2020
Issue 2 2020 , Editor's Choice
The Institute of Risk Management South Africa (IRMSA) has launched its sixth annual risk report, the IRMSA Risk Report SOUTH AFRICA RISKS 2020.

Read more...